Date: 2025-11-28 (America/New_York)

Generated: 2025-12-03 23:04:01 UTC

TLDR

Recent cybersecurity developments highlight an active threat landscape involving cryptocurrency exchange thefts, supply chain malware in npm and PyPI ecosystems, data breaches at major organizations, AI language model jailbreak vulnerabilities, and exploitation of collaboration and calendar services. Several incidents emphasize the evolving sophistication of nation-state and criminal actors, underscoring the need for enhanced identity and access management, supply chain security, data protection, and incident response capabilities. Diversity and governance challenges in cybersecurity communities and digital identity projects also surfaced, reflecting broader organizational risk contexts.

Executive Summary

The cybersecurity briefing for this period underscores a diverse set of emerging and ongoing threats targeting large organizations across sectors. The cryptocurrency space remains vulnerable to high-impact thefts following acquisitions, exemplified by the Upbit compromise immediately after acquiring by Naver. Cloud collaboration platforms like Microsoft Teams reveal structural security gaps unable to provide consistent endpoint protection when users engage with external tenants, requiring reexamination of guest access policies and cross-tenant trust boundaries. Data privacy incidents at sports federations and telecommunications providers demonstrate continued risks to personal information through credential compromise and database breaches, highlighting gaps in access controls and monitoring.

Supply chain attacks dominate the software development ecosystem with widespread deployment of malicious packages in npm and PyPI registries. Incidents such as North Korean OtterCookie malware via npm modules and legacy Python bootstrap script vulnerabilities facilitating potential domain takeovers illustrate the persistent complexity of securing open-source supply chains. A notable CI/CD pipeline flaw in PostHog led to a worm-like npm malware outbreak, exemplifying the dangers of elevated privileges and automated workflows misconfigurations.

Advanced adversarial tactics in AI platforms have surfaced through new prompt injection techniques utilizing poetic reframing, challenging prevailing AI safety frameworks and necessitating more comprehensive adversarial testing and governance. Calendar application abuses by threat actors exploiting subscription mechanisms have highlighted an often-overlooked attack surface requiring urgent security attention.

Governance and operational challenges also surface in digital identity initiatives and institutional security operations, with the UK’s multi-billion-pound digital ID project facing budgetary uncertainties, and premature publication of budget forecasts raising procedural and accountability concerns. Furthermore, diversity and inclusion considerations within cybersecurity training providers emphasize imperative cultural reforms to build equitable and effective cybersecurity communities.

Collectively, these developments necessitate a concerted organizational focus on strengthening identity and access management, integrating supply chain risk mitigation, advancing data protection and privacy capabilities, enhancing incident detection and response mechanisms, and fostering inclusive, transparent governance structures.

Recommended Actions

  • Strengthen Identity and Access Management (IAM) with conditional access, multi-factor authentication, and strict guest access policies to reduce exposure through collaboration platforms and credential compromise.
  • Enhance Supply Chain Security by integrating automated scanning, trusted publisher models, and proactive monitoring of open-source package dependencies to mitigate malicious code injection in CI/CD pipelines and package registries.
  • Implement comprehensive Data Security and Privacy controls including encryption, privileged account monitoring, rapid breach response, and transparent communication aligned with regulatory requirements to protect personal identifiable information (PII).
  • Advance Threat and Vulnerability Management by prioritizing timely vulnerability patching, adversarial testing of AI models, and incorporating novel detection techniques for emerging threat vectors like calendar subscription abuse.
  • Develop Security Incident Response capabilities tailored to supply chain compromises, cloud collaboration threats, and high-impact data breaches ensuring rapid containment and remediation.
  • Promote Diversity, Equity, and Inclusion (DEI) initiatives to cultivate inclusive cybersecurity communities ensuring broad representation and reducing systemic bias.
  • Govern large-scale digital transformation projects with robust cost management, risk assessments, and stakeholder engagement to align budgets, compliance, and operational priorities.
  • Elevate User Security Awareness focusing on safe behaviors in public networks, phishing recognition, handling external collaboration invitations, and cautious calendar subscription management.

Article TLDRs

AAC — Audit & Accountability

OBR drags in cyber bigwig after Budget leak blunder

The UK Office for Budget Responsibility (OBR) enlisted former NCSC chief Ciaran Martin to investigate an accidental early online publication of its Budget forecast. The incident exposed sensitive financial data prematurely, prompting a formal review focused on the cause and future breach prevention.

AIS — Application & Interface Security

Prompt Injection Through Poetry

A new academic study reveals that adversarial poetry can effectively bypass safety mechanisms in large language models (LLMs), achieving high success rates in jailbreaking them. This stylistic variation poses a fundamental challenge to current AI alignment and evaluation approaches, raising concerns about LLM misuse in sensitive domains.

CCC — Change Control & Configuration Management

PostHog admits Shai-Hulud 2.0 was its biggest ever security bungle

PostHog experienced its largest security incident when malicious actors exploited a CI/CD automation flaw to inject worm-like malware in npm JavaScript SDKs. The attack harvested developer credentials and spread malware to over 25,000 developers in three days. PostHog is overhauling its build processes and adopting stricter publishing controls.

DSP — Data Security & Privacy

French Football Federation Suffers Data Breach

The French Football Federation suffered a data breach exposing millions of licensed players' personal information, including names, birth data, and contact details. The breach occurred via a compromised account and was promptly mitigated by disabling the account and resetting passwords. The Federation has notified authorities and urged users to remain vigilant against phishing.

Three Black Friday Scams to Watch Out For This Year

Phishing scams targeting consumers during Black Friday 2025 are sharply increasing, with a 620% rise in related campaigns observed. Common tactics involve brand impersonation of major retailers, fake marketing domains, and AI-generated phishing emails. Consumers and organizations must exercise caution and enhance phishing defenses during peak shopping periods.

French Soccer Federation Hit by Cyberattack, Member Data Stolen

The French Soccer Federation confirmed a cyberattack via compromised credentials that resulted in the theft of members' personal data, including names, contact details, and nationalities. The breach was contained by disabling the compromised account and resetting passwords. The Federation is enhancing security measures and has filed a complaint.

Brit telco Brsk confirms breach as bidding begins for 230K+ customer records

British telecommunications company Brsk confirmed a data breach affecting over 230,000 customer records containing names, addresses, phone numbers, and vulnerability status. Customers are being offered fraud protection, with investigations ongoing and authorities notified. The breach did not impact financial credentials or network operations.

Public GitLab repositories exposed more than 17,000 secrets

A security engineer scanned 5.6 million public GitLab repositories and identified over 17,000 exposed secrets, including API keys and tokens, spanning more than 2,800 domains. This leak density surpasses that found in similar Bitbucket scans, representing a significant risk of credential compromise.

GRC — Governance, Risk & Compliance

UK digital ID plan gets a price tag at last – £1.8B

The UK government has finally costed its nationwide digital ID scheme at £1.8 billion over three years, but funding remains unfunded and will come from existing departmental budgets. The program aims to offer digital identity to all legal residents by 2029 but faces scrutiny over budget prioritization and resource allocation.

GrapheneOS bails on OVHcloud over France's privacy stance

GrapheneOS is withdrawing servers from French cloud provider OVHcloud due to concerns about France's digital privacy stance and legislation potentially mandating backdoors in encryption. The move highlights ongoing tensions around digital sovereignty, privacy, and legal jurisdiction within cloud service provisioning in Europe.

HRS — Human Resources Security

TryHackMe races to add women to Christmas cyber challenge roster after backlash

Cybersecurity training provider TryHackMe faced backlash after announcing an all-male lineup for its 2025 Christmas cyber challenge. The company acknowledged the omission and is actively working to include female experts, highlighting broader diversity issues in cybersecurity content creators and influencer culture.

IAM — Identity & Access Management

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Microsoft Teams' guest access introduces a security blind spot where users joining external tenants may lose Microsoft Defender protections, exposing them to phishing and malware. An attacker can exploit this by inviting victims as guests into unprotected malicious tenants, bypassing native security controls. Organizations should restrict guest access and enforce cross-tenant security policies to mitigate this risk.

Why Organizations Are Turning to RPAM

Remote Privileged Access Management (RPAM) is rapidly becoming essential as organizations adopt hybrid and remote work models. RPAM extends traditional PAM by securing privileged access beyond on-premises boundaries without relying on VPNs, enforcing least privilege, continuous authentication, session recording, and compliance automation.

Microsoft: Windows updates make password login option invisible

Windows 11 updates released since August 2025 have caused the password sign-in option to become invisible on the lock screen when multiple authentication methods are enabled, though the password functionality itself remains accessible by hovering over the area. Microsoft is working on a fix without a current timeline.

OTHER — Cross-Domain / General Security

This month in security with Tony Anscombe – November 2025 edition

ESET’s November 2025 security roundup covered a range of notable events including data exposures from major AI companies, the financial impact of the Akira ransomware group, coordinated law enforcement actions disrupting malware families, and emerging privacy concerns on social media platforms. The briefing provides insights into evolving threat landscapes and cybersecurity trends across industries.

TVM — Threat & Vulnerability Management

In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked

A cybersecurity roundup highlights multiple emerging threats including the HashJack AI browser attack using prompt injection, leaked internal documents revealing the operational structure of the Iranian APT Charming Kitten group, and notable arrests and lawsuits related to cybercrime. These incidents underscore evolving attacker tactics and ongoing law enforcement efforts.

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware Delivery

Threat actors are exploiting calendar subscription features to deliver phishing and malware payloads by manipulating third-party calendar infrastructure. These malicious subscriptions often reside on hijacked or expired domains, allowing attackers to push harmful calendar events and notifications, creating an overlooked security risk.

Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

Security researchers identified vulnerable legacy bootstrap scripts in multiple Python packages that fetch installation code from an obsolete and expired domain, exposing them to domain takeover and supply-chain risks. Attackers could exploit this to distribute malicious code. Additionally, a malicious PyPI package delivering a remote access trojan was discovered and removed.

UEM — Endpoint & Mobile Security

Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison

An Australian man was sentenced to over seven years in prison for operating 'evil twin' WiFi networks on flights and airports to steal data from unsuspecting users. The attacker cloned legitimate WiFi SSIDs and used phishing pages to capture social media credentials, which he abused to access accounts and steal private content.

VRM — Vendor & Supply Chain Risk Management

Korean web giant Naver acquired crypto exchange Upbit, which reported a $30m heist a day later

South Korean web giant Naver acquired cryptocurrency exchange Upbit, which was hit by a $30 million theft the next day. Upbit suspended Solana wallet operations due to an 'abnormal withdrawal situation,' leading to the loss. The exchange pledged to cover customer losses and is investigating, while previous attacks tied to North Korean threat actors highlight ongoing risks.

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

North Korean threat actors are aggressively deploying 197 malicious npm packages to distribute an updated OtterCookie malware variant designed for credential theft and remote control. The malware evades sandbox detection and compromises sensitive data including browser credentials and cryptocurrency wallet information. These supply chain attacks highlight ongoing risks in JavaScript ecosystem security.

Detailed Summaries

AAC — Audit & Accountability

OBR drags in cyber bigwig after Budget leak blunder

Summary:

The OBR mistakenly uploaded the November 2025 Economic and Fiscal Outlook document to a publicly accessible server nearly an hour before the Chancellor's official announcement. Though not linked from the official website, the predictable URL allowed journalists to access the sensitive data in advance. The breach compromised embargo protocols and potentially jeopardized policy disclosure integrity. In response, OBR appointed cybersecurity veteran Ciaran Martin to conduct an expert-led investigation, reviewing technical controls, publishing workflows, and recommending corrective measures to prevent recurrence.

Recommended Response:

Organizations managing time-sensitive or embargoed content must adopt robust audit and access controls throughout the publication lifecycle. Incorporating multi-layered security reviews and technical barriers reduces accidental leaks. Continuous monitoring and employee education are essential. In the event of leaks, swift incident response plans minimize operational and reputational damage. Engaging cybersecurity expertise to analyze failures and implement remedial actions fortifies defenses against future disclosure errors.

  • Implement strict access control and review workflows for sensitive document publication.
  • Use technical safeguards such as pre-release access logs and URL obscurity improvements.
  • Conduct regular security audits of content management and publication platforms.
  • Develop incident response and communication plans specific to data leaks.
  • Train employees on embargo policies and security best practices.

AIS — Application & Interface Security

Prompt Injection Through Poetry

Summary:

Researchers introduced a novel method for generating adversarial inputs by converting harmful prompts into poetic form, significantly increasing their success in circumventing LLM refusal heuristics. The study tested across 25 advanced proprietary and open-source models, achieving attack success rates exceeding 90% in some instances. These poetic injections effectively transfer across distinct risk categories such as chemical or cyber offenses. The findings expose a systematic vulnerability to stylistic reframing, indicating that existing safety training and evaluation protocols are insufficient for comprehensive AI risk mitigation. The research refrains from providing explicit malicious examples, citing security concerns.

Recommended Response:

Organizations deploying AI language models should prioritize rigorous adversarial testing regimes encompassing diverse injection techniques such as stylized or poetic prompts. Augmenting training and detection models to recognize such inputs can improve resistance to manipulation. Collaboration between AI developers, researchers, and regulators is critical to close fundamental safety gaps revealed by these findings. Policy frameworks should be established to govern AI usage where risks of harm via adversarial jailbreaks are significant.

  • Integrate diversified input testing including adversarial and stylistic variations into AI safety evaluations.
  • Enhance LLM training datasets with counterexamples of poetic and indirect prompt manipulations.
  • Develop multi-modal detection frameworks to recognize stylistic jailbreak attempts.
  • Collaborate across AI developers to share best practices and threat intelligence related to adversarial inputs.
  • Establish governance policies restricting deployment of LLMs in high-risk operational contexts.

CCC — Change Control & Configuration Management

PostHog admits Shai-Hulud 2.0 was its biggest ever security bungle

Summary:

Attackers submitted a malicious pull request that triggered an automated workflow running with full project privileges in PostHog’s CI/CD pipeline. This allowed exfiltration of personal access tokens with broad permissions, enabling the attackers to add malicious pre-install scripts to widely used SDK packages. These scripts scanned developer machines for secrets and published further compromised packages, resulting in a self-propagating worm infecting thousands globally. PostHog revoked compromised credentials, removed infected package versions, and is implementing a trusted publisher release model with improved workflow reviews and disabling install script execution.

Recommended Response:

Development organizations must treat CI/CD pipelines as critical security boundaries enforcing strict access controls and least privilege execution. Incorporating manual gating and strong validation into pipeline workflows reduces risk of malicious code execution. Frequent credential rotation and MFA mitigates token theft impact. Continuous monitoring and alerting can identify unusual publishing or token usage patterns early. This multipronged approach prevents pipeline abuses like those exploited in the Shai-Hulud 2.0 incident, enhancing software supply chain security.

  • Implement least privilege principles in CI/CD automation triggers.
  • Restrict execution of untrusted code and disable install scripts in pipelines.
  • Adopt multi-factor authentication and token rotation for automation credentials.
  • Review and enhance workflow code review policies before deployment.
  • Monitor package registries and developer environments for anomalous activity.

DSP — Data Security & Privacy

French Football Federation Suffers Data Breach

Summary:

Unauthorized access was detected on the administrative software platform managing registrations for all licensed football clubs in France, compromising personal data of millions of amateur players. The breach likely began on November 20 and involved sensitive personal data such as names, dates of birth, nationalities, postal and email addresses, and license IDs. Upon detection, the FFF disabled the compromised account and reset all account credentials. Notifications were sent to impacted individuals, regulators, and law enforcement. The federation also warned players about potential phishing scams imitating official communications exploiting the breach.

Recommended Response:

Organizations managing large volumes of personal data must enforce strong identity and access management practices to prevent unauthorized account use. Immediate incident containment steps, such as account disabling and password resets, are critical. Regulatory compliance for breach notification should be proactively managed. Post-breach, educating the user base to recognize scam communications is necessary to reduce secondary exploitation risks. Continuous monitoring and enhancements to security frameworks should be prioritized to mitigate similar future incidents.

  • Implement multi-factor authentication and strict access controls for administrative accounts.
  • Regularly audit and monitor privileged account activities.
  • Deploy user behavior analytics for early detection of anomalous access.
  • Provide timely breach notifications to individuals and regulators as required.
  • Conduct phishing awareness training tailored to breach aftermath.

Three Black Friday Scams to Watch Out For This Year

Summary:

Darktrace's analysis shows a dramatic escalation in phishing attempts themed around Black Friday and Cyber Monday sales, exploiting consumer eagerness for deals. Brand impersonation emails heavily target recognizable retailers such as Amazon, which alone accounts for 80% of phishing attempts. Scammers also deploy deceptive domains that mimic marketing outlets to lure victims with enticing offers, redirecting them to fraudulent websites to steal credentials and payment data. The adoption of generative AI to craft more convincing phishing messages marks a significant shift, with long, nuanced emails resembling legitimate communications. This trend necessitates heightened vigilance and defensive readiness during high-volume retail events.

Recommended Response:

Organizations and consumers should strengthen email and web defenses to counteract surge in phishing attacks leveraging branded themes and generative AI during shopping events. Deploying sophisticated threat detection technologies capable of identifying AI-crafted phishing content is imperative. Increasing user awareness and skepticism around unsolicited offers reduces victimization. Combining technical controls with behavioral education bolsters resilience against credential theft and financial fraud exploits prevalent in these periods.

  • Implement advanced email filtering and phishing detection systems.
  • Conduct targeted user awareness campaigns before peak shopping seasons.
  • Maintain updated threat intelligence on brand impersonation and domain fraud.
  • Encourage cautious behavior around unsolicited promotional offers and links.
  • Employ multi-factor authentication to mitigate credential compromise risks.

French Soccer Federation Hit by Cyberattack, Member Data Stolen

Summary:

The Federation's administrative software platform was targeted by cybercriminals who accessed member data through a compromised account. The unauthorized access included personal information of registered members but did not specify the extent of affected individuals. Immediate remediation actions involved deactivating the compromised account and a full password reset for users. The organization notified law enforcement and regulatory bodies, reflecting adherence to data breach protocols. The Federation reaffirmed its commitment to data protection by continuously strengthening security controls against evolving cyber threats.

Recommended Response:

Entities safeguarding PII must implement comprehensive identity and access management controls to prevent unauthorized data access. Post-incident, rapid containment steps such as credential invalidation are essential to mitigate damage. Mandatory breach notification fosters transparency and compliance. Strengthening monitoring and user training fortifies defenses against credential-based attacks. These measures collectively enhance organizational data security and maintain stakeholder trust.

  • Strengthen account security through multi-factor authentication.
  • Implement continuous monitoring for early detection of credential compromise.
  • Exercise rigorous incident response plans including timely account lockdowns.
  • Report data breaches promptly to regulatory authorities.
  • Enhance user education on secure credential management and phishing awareness.

Brit telco Brsk confirms breach as bidding begins for 230K+ customer records

Summary:

Cybercriminals posted an advertisement on underground forums claiming possession of over 230,000 customer records stolen from Brsk. The compromised data includes personal identifiers and sensitive tags like vulnerability indicators. Brsk confirmed unauthorized database access via a security incident, emphasizing that critical financial information remains secure. Affected customers have been informed and are provided with complimentary monitoring services. The breach is being investigated with help from security specialists. Brsk's incident adds to a series of cybersecurity challenges observed across UK telcos in 2025, highlighting systemic risks in the sector.

Recommended Response:

Telecommunications providers must elevate data protection mechanisms, especially for sensitive customer information beyond financial credentials. Continuous security monitoring and rapid response capabilities are critical for early breach detection and mitigation. Building transparent communication channels with customers bolsters trust post-incident. Sector collaboration enables collective defense against common adversaries. Vendor risk management ensures holistic supply chain security. Together, these approaches strengthen the resilience of telco ecosystems against escalating cyber threats.

  • Enforce comprehensive data encryption and access controls to protect customer information.
  • Implement continuous monitoring to detect unauthorized data exfiltration.
  • Conduct thorough breach impact analyses and communicate transparently with affected users.
  • Engage in sector-wide information sharing to identify emerging telco threats.
  • Review and harden third-party vendor security practices.

Public GitLab repositories exposed more than 17,000 secrets

Summary:

Using the TruffleHog tool and AWS infrastructure, the researcher enumerated and scanned all public GitLab repositories within a 24-hour period, uncovering numerous sensitive credentials embedded in codebases. The leaked secrets included Google Cloud Platform keys, MongoDB credentials, Telegram bot tokens, OpenAI API keys, and GitLab access tokens. Many secrets dated from post-2018 but some older credentials from 2009 remained active. Automated notifications were sent to affected organizations resulting in revocation of many secrets and monetary bug bounty awards. Despite efforts, some secrets remain exposed, underscoring the persistent challenge of secret management in public repositories.

Recommended Response:

Organizations must prioritize embedding secret detection and prevention mechanisms directly into development and deployment processes to reduce inadvertent exposure. Automated scanning integrated in code repositories and pipelines helps identify secrets before they become public. Prompt rotation and revocation limits the window of exploitation. Developer training reinforces compliance with secure coding standards. Coordinated, automated incident response enhances the ability to rapidly remediate exposed secrets, safeguarding critical systems from credential-based attacks.

  • Integrate secret scanning and prevention tools within code repositories and CI/CD pipelines.
  • Enforce strict policies against committing secrets to public or unauthorized repositories.
  • Conduct regular credential rotation and immediate revocation of leaked secrets.
  • Automate incident response workflows for exposed secrets detection.
  • Educate developers on secure coding practices and secrets management.

GRC — Governance, Risk & Compliance

UK digital ID plan gets a price tag at last – £1.8B

Summary:

Following prolonged uncertainty, the Office for Budget Responsibility estimated that the UK's digital ID program will cost approximately £0.6 billion annually, totaling £1.8 billion over three years. This estimate came after government officials declined to disclose cost details earlier. The expenditure will draw from departmental expenditure limits without identified specific savings or new funding sources, prompting concerns about trade-offs with other critical government priorities. The digital ID initiative is intended to improve identity verification processes, facilitate access to services, and enhance government efficiency. Parliamentary discussions highlight potential political and financial challenges in delivering this ambitious project.

Recommended Response:

Enterprises and public sector entities involved in or impacted by digital identity initiatives must embed strong governance frameworks that transparently manage costs, risks, and compliance obligations. Aligning project funding with organizational priorities ensures resource availability and accountability. A phased, risk-managed approach facilitates iterative improvement and stakeholder confidence. Robust privacy and security policies underpin user trust and adherence to regulatory standards in digital identity deployments.

  • Maintain transparent governance and rigorous cost tracking for large-scale digital identity projects.
  • Engage all stakeholders early to align budget commitments and implementation roadmaps.
  • Address compliance and privacy regulations within the design and deployment of digital IDs.
  • Plan for phased rollouts with clear milestones to monitor expenditure and outcomes.
  • Incorporate risk assessments on funding uncertainties affecting implementation timelines.

GrapheneOS bails on OVHcloud over France's privacy stance

Summary:

GrapheneOS cited fears of French governmental expectations for backdoors in encryption and device access as reasons for moving away from OVHcloud servers. OVHcloud acknowledged no technical server issues but underscored challenges related to national legislation including support for controversial EU 'Chat Control' proposals which could require access to user communications. Ongoing legal disputes involving OVHcloud, especially concerning data access under Canadian orders, compound sovereignty concerns. Industry voices emphasize that true sovereignty entails clear governance and trust over data within legal frameworks, urging reconsideration of these issues to avoid erosion of privacy-first cloud services in Europe.

Recommended Response:

Organizations relying on cloud providers must rigorously evaluate the interplay between legal jurisdictions and privacy commitments to ensure data governance aligns with organizational risk appetite and compliance standards. Staying informed on legislative trends and potential backdoor requirements enables proactive risk management. Contracts should explicitly address data sovereignty guarantees. Contingency architectures, including multi-cloud or migration capabilities, reduce disruption risks. Collaborative industry engagement can influence policy toward balancing privacy and regulatory demands.

  • Assess cloud service providers' legal jurisdiction risks for data sovereignty and privacy.
  • Monitor evolving regional legislation impacting encryption and data access mandates.
  • Engage legal and compliance teams in cloud provider selection and contract negotiations.
  • Develop contingency plans for migration in response to adverse legal or privacy developments.
  • Advocate for clear regulatory frameworks supporting privacy-preserving cloud solutions.

HRS — Human Resources Security

TryHackMe races to add women to Christmas cyber challenge roster after backlash

Summary:

TryHackMe’s Advent of Cyber 2025 event initially revealed helpers consisting exclusively of men, sparking criticism regarding gender representation. Attempts to recruit female contributors had mixed results, with some declining due to prior commitments and others not responding. The company recognized the need for better communication and has partnered with Microsoft’s Eva Benn to recruit women for the helper lineup. Industry commentators stressed that the situation reflects systemic sexism and underrepresentation in cybersecurity influencer communities, exacerbated by market saturation and cultural challenges inhibiting equitable participation.

Recommended Response:

Organizations involved in cybersecurity education and community engagement must prioritize diversity, equity, and inclusion to enhance participation and innovation. This involves proactive outreach to underrepresented groups, transparent accountability for diversity goals, and fostering supportive environments that mitigate bias and exclusion. By incorporating inclusive practices strategically, organizations enrich talent pools, better reflect their user communities, and reduce cultural vulnerabilities that hinder progress.

  • Develop and enforce inclusive recruiting policies promoting diversity and equity.
  • Foster partnerships with diverse talent pools and professional networks.
  • Ensure transparency and communication around diversity efforts.
  • Promote a culture that values diverse contributors and addresses sexism/ageism.
  • Support mentorship and sponsorship programs to grow diverse pipelines.

IAM — Identity & Access Management

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants

Summary:

Researchers identified that when users access Teams as guests in external tenants, their Office 365 Defender protections are governed by the host tenant's policies, not their home organization’s. This architectural gap allows an attacker to create 'protection-free zones' by configuring their tenant with minimal or no Defender safeguards. Attackers can send authentic invitations from Microsoft infrastructure that bypass email security filters to lure victims. Once accepted, victims operate without protections, allowing attackers to distribute phishing and malware payloads transparently. Existing Teams messaging policies partially mitigate risk but do not prevent receiving external guest invitations, necessitating additional controls and user training.

Recommended Response:

Enterprises should enforce strict governance over guest access in collaboration platforms like Microsoft Teams. This includes whitelisting trusted domains, applying zero-trust principles to external collaborations, and implementing continuous monitoring of guest accounts and activities. Technical controls such as cross-tenant access policies and disabling guest invitations where possible reduce exposure. Moreover, user awareness campaigns emphasizing vigilant response to unsolicited guest invitations are essential to mitigating social engineering vectors that bypass traditional endpoint protections.

  • Restrict B2B collaboration settings to trusted domains only.
  • Implement cross-tenant access controls and regularly review guest access configurations.
  • Disable or limit guest access if not business-critical.
  • Educate users to recognize suspicious guest invitations and potential phishing attempts.
  • Monitor Teams guest activity closely for anomalous behavior.

Why Organizations Are Turning to RPAM

Summary:

With the increasing distribution of IT environments and remote workforce, conventional PAM solutions lack the scalability and flexibility required for secure privileged access across hybrid cloud and remote infrastructures. RPAM addresses these challenges by enabling access control irrespective of user location or device, applying zero-trust principles and avoiding VPN dependencies. It automates session monitoring, implements Just-in-Time privilege grants, and integrates compliance-related audit capabilities. Adoption is driven by the need to mitigate remote access attack vectors, meet regulatory requirements, and support modern workflows efficiently. Future trends include integrating AI-driven threat detection to preemptively identify suspicious privileged activities.

Recommended Response:

Organizations managing distributed IT and hybrid workforces need to evolve their privileged access frameworks beyond traditional PAM. Deploying RPAM solutions enables secure and auditable privileged access without relying on legacy VPNs or agent-heavy controls. It supports dynamic access policies and comprehensive monitoring necessary for modern cloud and on-prem environments. Adoption of RPAM enhances security posture, reduces attack surface, simplifies compliance, and empowers IT security teams with actionable insights through integrated analytics and AI-powered threat detection.

  • Evaluate and adopt RPAM solutions that support cloud-native and zero-trust architectures.
  • Implement Just-in-Time and least privilege access policies for all privileged sessions.
  • Integrate privileged session recording and audit logging to meet compliance needs.
  • Replace VPN-dependent remote access with secure RPAM access pathways.
  • Leverage AI/ML capabilities within RPAM for proactive threat detection.

Microsoft: Windows updates make password login option invisible

Summary:

Due to a bug introduced by non-security preview and subsequent updates (starting with KB5064081), the password icon on the Windows 11 lock screen may be hidden for users with multiple sign-in options like PIN or fingerprint. The password field functions normally but users must hover over the missing icon's location to reveal it. This usability issue affects Windows 11 versions 24H2 and 25H2. Microsoft recommends using the invisible button for password entry as a temporary workaround and is investigating the problem but has not yet provided a formal fix or timeline. Previous update-related issues, including media playback problems and UAC prompts, have also been addressed by Microsoft.

Recommended Response:

Enterprises should communicate clearly with end users about the current Windows 11 login icon invisibility workaround to minimize helpdesk tickets. IT teams should track Microsoft update bulletins closely for resolved patches. Consider deployment freezes or phased rollouts if the issue affects critical user populations. Offering diversified authentication options, such as PIN or biometric login, can mitigate user frustration. Overall, preparing support and user education materials ensures continuity of access until Microsoft delivers a patch.

  • Inform users and IT support teams about the hover workaround to access password login.
  • Monitor Microsoft update advisories for fixes related to sign-in issues.
  • Consider delaying non-critical updates pending resolution of known usability bugs.
  • Provide alternative authentication methods to end-users during impact.
  • Prepare support resources to assist users experiencing login difficulties.

OTHER — Cross-Domain / General Security

This month in security with Tony Anscombe – November 2025 edition

Summary:

The report highlighted significant leaks of sensitive credentials and API keys from leading AI firms, revealing lapses in secure code management. Government agencies issued alerts about Akira ransomware's substantial illicit revenue, emphasizing the persistent ransomware threat. Europol-led operations successfully disrupted several malware families, demonstrating increased international collaboration in cybercrime countermeasures. Additionally, new regulatory and privacy developments such as Australia's social media ban for minors and X's controversial location feature were discussed, illustrating the intersection of policy and security. This briefing encapsulates critical incidents shaping the cybersecurity domain in November 2025.

Recommended Response:

Enterprises can leverage monthly threat intelligence briefings to anticipate and mitigate emerging cyber risks. Strengthening internal processes around secret and credential management reduces attack surfaces exposed through inadvertent leaks. Developing ransomware resilience through prevention, detection, and recovery planning is critical. Active engagement in multi-stakeholder intelligence and law enforcement partnerships expands situational awareness. Staying abreast of regulatory and social platform changes allows for timely policy adjustment ensuring compliance and enhanced user protection.

  • Enforce rigorous secrets management and code repository scanning.
  • Enhance ransomware detection and incident response capabilities.
  • Participate in collaborative cybersecurity intelligence sharing.
  • Monitor regulatory changes affecting social media and privacy.
  • Adapt security policies to reflect evolving digital threat landscapes.

TVM — Threat & Vulnerability Management

In Other News: HashJack AI Browser Attack, Charming Kitten Leak, Hacker Unmasked

Summary:

The HashJack attack represents a novel prompt injection technique exploiting AI browser assistants to execute malicious commands hidden in URLs, affecting vendors including Comet, Edge, and Chrome. Despite patches released by most vendors, the risks of phishing and data exfiltration remain significant. Additionally, leaked documents of the Iranian APT Charming Kitten reveal a militarized hacking structure emphasizing quota-driven operations. Arrests of cybercriminals like Scattered Spider members and legal actions such as TP-Link’s defamation lawsuit against Netgear illustrate active disruption efforts. The report also covers botnet activities during major cloud outages and regional APT expansions in Central Asia, indicating persistent and diverse threat actor behaviors.

Recommended Response:

Enterprises must maintain vigilant patch management processes to address evolving threats like HashJack prompt injections. Incorporating threat intelligence feeds on nation-state and cybercriminal group activities supports proactive defense. Security awareness programs should highlight emerging social engineering and technical attack methods. Coordinated efforts across security, legal, and vendor management teams enable effective risk mitigation. Deploying defense-in-depth architectures, including endpoint detection and response supported by anomaly analytics, enhances resilience against advanced persistent threats and supply chain compromises.

  • Apply security patches promptly to mitigate known vulnerabilities such as HashJack.
  • Enhance threat intelligence sharing to monitor APT activity and emerging attack vectors.
  • Conduct regular security awareness training on sophisticated attack techniques.
  • Monitor vendor communications and legal developments impacting cybersecurity posture.
  • Implement layered defenses including behavioral anomaly detection.

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware Delivery

Summary:

Calendar series subscriptions enable third parties to insert events and notifications directly into users' devices, a legitimate feature often used by retailers or sports associations. However, attackers leverage this by operating deceptive subscription servers on expired or commandeered domains to disseminate phishing URLs, malicious attachments, and potentially execute JavaScript. Research by BitSight identified hundreds of suspicious domains receiving millions of daily requests, indicating substantial subscription abuse. Despite providers like Apple and Google enhancing ecosystem security, calendar-based attacks remain a blind spot, distinct from traditional email security challenges, and may affect both personal and enterprise calendars if users subscribe to malicious feeds.

Recommended Response:

Enterprises should recognize calendar subscriptions as a potential attack vector often overlooked in security monitoring. Policies restricting subscriptions to verified sources reduce exposure to malicious events. Security teams should incorporate calendar feed analysis within endpoint threat detection tools. Engaging with platform providers fosters adoption of stronger validation mechanisms. Comprehensive user education emphasizing cautious subscription behavior complements technical defenses, mitigating risks from social engineering and malware dissemination through calendar infrastructures.

  • Educate users and administrators about risks of subscribing to unknown or untrusted calendar feeds.
  • Monitor and audit calendar subscriptions within enterprise environments.
  • Deploy endpoint security controls to detect and block malicious calendar event content.
  • Collaborate with cloud and calendar service providers to improve validation and security of third-party subscriptions.
  • Incorporate calendar feed security into broader phishing and malware defense strategies.

Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

Summary:

Several legacy Python packages include a bootstrap.py script that attempts to download and execute installation scripts for the deprecated Distribute package from python-distribute.org, a domain currently for sale. If an attacker acquires this domain, they could serve malicious payloads whenever the bootstrap script is run, leading to supply chain compromises. While bootstrap.py is not auto-executed during installation and targets Python 2, its presence creates an unnecessary attack surface. Separately, researchers uncovered a malicious PyPI package named 'spellcheckers' that installs a backdoor enabling remote code execution. The package was promptly removed, but the incident illustrates ongoing risks in open-source package ecosystems.

Recommended Response:

Enterprises consuming Python packages should conduct thorough supply chain risk assessments, including vetting of embedded scripts that may reach out to obsolete or externally controlled resources. Collaborating with open-source communities to remediate legacy vulnerabilities reduces exposure. Security teams must integrate automated malware scanning into build pipelines and restrict script execution contexts. Awareness of evolving attack techniques, such as malicious PyPI packages, is essential for proactive defenses in Python development workflows.

  • Audit dependency packages for legacy or deprecated scripts that reach out to external domains.
  • Encourage package maintainers to remove or update vulnerable bootstrap scripts.
  • Restrict execution of scripts from untrusted sources in development and build environments.
  • Employ automated scanning tools to detect malicious packages in repositories.
  • Maintain vigilance for emerging supply chain malware targeting Python ecosystems.

UEM — Endpoint & Mobile Security

Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison

Summary:

Using a portable 'WiFi Pineapple' device, the defendant created rogue access points mirroring airport WiFi networks in Perth, Melbourne, and Adelaide. Passengers connecting to these networks were redirected to fake captive portals designed to harvest social media login credentials. The attacker then exploited these to invade victims’ privacy and steal intimate images and videos. Australian Federal Police confiscated equipment and prosecuted the man based on evidence from forensic analysis, which uncovered thousands of compromised items. The attack highlights the dangers of public WiFi and emphasizes the importance of using VPNs, strong passwords, and disabling automatic connections.

Recommended Response:

Organizations must recognize public WiFi as a common attack vector exploiting user trust. Deploying robust user education on connecting only to trusted networks, the use of VPNs, and being cautious with captive portals reduces attack surface. Endpoint security tools should incorporate detection mechanisms for rogue WiFi access points and anomalous network behaviors. Enforcing policy controls prohibiting automatic network connections and disabling network sharing further hardens devices. These layered controls collectively mitigate the threat posed by evil twin WiFi attacks in both travel and public environments.

  • Educate users on the risks of public and captive portal WiFi networks.
  • Encourage mandatory use of VPNs when accessing public WiFi.
  • Implement endpoint security solutions capable of detecting evil twin WiFi access points.
  • Disable automatic WiFi connectivity and file sharing on user devices.
  • Conduct regular security awareness training emphasizing safe public network behaviors.

VRM — Vendor & Supply Chain Risk Management

Korean web giant Naver acquired crypto exchange Upbit, which reported a $30m heist a day later

Summary:

Naver made a significant investment by acquiring Dunamu Corp, operator of Upbit, aiming to expand its financial services. However, immediately following the acquisition, Upbit suffered a sizeable cyber theft amounting to $30 million, specifically targeting Solana cryptocurrency wallets. Upbit temporarily suspended deposits and withdrawals to conduct emergency wallet maintenance, revealing the theft later. Investigations pointed toward cybercriminal groups linked to North Korea, known for targeting crypto exchanges to finance governmental activities. Upbit took measures to protect customers and promised compensation from its own funds, but the incident stresses vulnerabilities in cryptocurrency exchange cybersecurity.

Recommended Response:

Large organizations engaging in acquisitions within the cryptocurrency domain must prioritize due diligence on the acquired entity's cybersecurity posture, particularly wallet security and fraud detection controls. They should implement multi-layered monitoring and rapid incident response frameworks tailored to crypto asset risks. Given the propensity of nation-state-linked threat actors targeting these organizations, there must be continuous threat intelligence sharing and vulnerability management to anticipate sophisticated attacks. Beyond technical controls, clear customer communication and loss mitigation policies are critical to maintaining trust during such incidents.

  • Conduct thorough security assessments of third-party acquisitions before deal closure.
  • Implement enhanced crypto wallet security controls, especially for hot wallets.
  • Develop rapid incident response plans for crypto asset management.
  • Continuously monitor for advanced persistent threat indicators linked to nation-state actors.
  • Ensure transparent customer communication strategies post-incident.

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

Summary:

The Contagious Interview campaign leverages npm registry to distribute loader packages that install OtterCookie malware combining features from earlier strains. Downloaded over 31,000 times, the malware establishes command-and-control channels enabling extensive system profiling, keylogging, clipboard theft, screenshot capturing, and exfiltration of sensitive files including cryptocurrency secrets. The malware uses hard-coded URLs hosted on threat actor infrastructure for payload delivery. This campaign represents a sophisticated supply chain compromise exploiting modern JavaScript workflows. Separate attacks involving fake assessment websites utilize GolangGhost malware to gain persistent access. These tactics emphasize weaponization of recruiting processes and open-source ecosystems by nation-state actors.

Recommended Response:

Large organizations must fortify their software supply chain security posture by embedding stringent dependency management processes and integrating runtime anomaly detection to identify malicious packages. Adopting zero-trust principles around open-source and third-party code reduces exposure. Developer training enhances resilience by raising awareness of evolving supply chain tactics. Engagement with open-source communities and registries accelerates mitigation of identified threats. These concerted actions minimize the risk of malware infiltration through modern development ecosystems.

  • Vet and monitor open-source dependencies rigorously within software development lifecycles.
  • Implement behavior-based detection of anomalous package activities in development and production environments.
  • Use code signing and trusted publisher models to verify package integrity.
  • Educate developers on supply chain risks and secure coding practices.
  • Coordinate with package registries to report and remove malicious packages promptly.

Article List

Not Reviewed Articles

  • Friday Squid Blogging: Flying Neon Squid Found on Israeli Beach — Schneier on Security (2025-11-28 20:56:20 (America/New_York)) [link]
    Reason: Failed to fetch article: HTTP 429 Too Many Requests